exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24837
The provided text describes a SQL injection vulnerability in PhpGedView 2.65beta5 and earlier, where the 'pids' parameter in timeline.php is not properly sanitized. It includes a sample URL demonstrating the injection point but lacks executable exploit code.
Classification
Writeup 90%
Target:
PhpGedView <= 2.65beta5
No auth needed
Prerequisites:
Access to the timeline.php endpoint
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24830
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. The example URI demonstrates how an attacker could inject malicious HTML and script code.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious URI link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24814
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. The example URI demonstrates how an attacker could inject hostile HTML and script code.
Classification
Writeup 90%
Target:
PhpGedView
No auth needed
Prerequisites:
A victim user must follow a malicious URI link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24819
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. An attacker could craft a malicious URI to execute arbitrary script code in the context of the victim's browser.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24835
The provided text describes a SQL injection vulnerability in PhpGedView, detailing how unsanitized user input in the 'level' and 'parent' parameters can manipulate SQL queries. It includes example URLs demonstrating the exploit but lacks actual exploit code.
Classification
Writeup 90%
Target:
PhpGedView 2.65beta5 and earlier
No auth needed
Prerequisites:
Access to the vulnerable PhpGedView instance
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24829
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. The example URI demonstrates how an attacker could inject malicious HTML and script code.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious URI link
exploitdb
WORKING POC
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24834
This exploit demonstrates a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. The provided URLs show how an attacker can inject malicious HTML and script code via the 'day', 'month', and 'year' parameters.
Classification
Working Poc 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24822
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. An attacker could craft a malicious URI to execute arbitrary script code in the context of the victim's browser session.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious URI link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24821
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. It includes an example URI demonstrating the vulnerability but lacks executable exploit code.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious URI link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24820
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. An attacker could craft a malicious URI to execute arbitrary script code in the context of the victim's browser.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious URI link
exploitdb
WORKING POC
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24816
This exploit demonstrates a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. An attacker can craft a malicious URI to execute arbitrary JavaScript in the context of the victim's browser session.
Classification
Working Poc 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a crafted malicious link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24831
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. An attacker could craft a malicious URI to execute arbitrary script code in the context of the victim's browser.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious link
exploitdb
WORKING POC
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24832
The exploit demonstrates a cross-site scripting (XSS) vulnerability in PhpGedView by injecting malicious HTML and script code via the 'path_to_find', 'pid1', and 'pid2' URI parameters. The vulnerability arises due to insufficient input sanitization, allowing arbitrary script execution in the context of the affected site.
Classification
Working Poc 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious URI link
exploitdb
WRITEUP
VERIFIED
by JeiAr · textwebappsphp
https://www.exploit-db.com/exploits/24810
The provided text describes a cross-site scripting (XSS) vulnerability in PhpGedView due to improper sanitization of user-supplied URI input. An attacker could craft a malicious URI to execute arbitrary script code in the context of the victim's browser.
Classification
Writeup 90%
Target:
PhpGedView (version not specified)
No auth needed
Prerequisites:
Victim must follow a malicious link